Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.106251
Kategorie:CISCO
Titel:Cisco IOS XR Software for NCS 6000 Series Devices OSPF Packet Processing Denial of Service Vulnerability
Zusammenfassung:A vulnerability in the OSPFv3 processing of Cisco IOS XR Software for;Cisco Network Convergence System (NCS) 6000 Series devices could allow an unauthenticated, remote attacker;to cause a reload of the OSPFv3 process and result in a limited denial of service (DoS) condition on an;affected device.
Beschreibung:Summary:
A vulnerability in the OSPFv3 processing of Cisco IOS XR Software for
Cisco Network Convergence System (NCS) 6000 Series devices could allow an unauthenticated, remote attacker
to cause a reload of the OSPFv3 process and result in a limited denial of service (DoS) condition on an
affected device.

Vulnerability Insight:
The vulnerability is due to insufficient logic in the processing of
crafted OSPFv3 packets. An attacker could exploit this vulnerability by sending crafted OSPFv3 packets to be
processed by an affected device.

Vulnerability Impact:
An exploit could allow the attacker to cause a reload of the OSPFv3 process
and cause a limited DoS condition on the affected device.

Solution:
See the referenced vendor advisory for a solution.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2016-1433
BugTraq ID: 92961
http://www.securityfocus.com/bid/92961
Cisco Security Advisory: 20160914 Cisco IOS XR Software for NCS 6000 Series Devices OSPF Packet Processing Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160914-iosxr
http://www.securitytracker.com/id/1036832
CopyrightCopyright (C) 2016 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.